Abstract is missing.
- MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing EnvironmentsNoah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang. 1-6 [doi]
- OFDM-IM Performance Evaluation Under Jamming AttackAhmet Kaplan, Ibrahim Altunbas, Gunes Karabulut Kurt, Mustafa Kesal, Defne Kucukyavuz. 1-6 [doi]
- QNOC Isochronous Router with Efficient Dynamic Virtual channel and Error TerminationM. Lakshmi Prasad Reddy, Sumanth Sakkara. 1-6 [doi]
- A Study of Reference Node Placement based on 4- quadrant Node Selection in Ultra Wideband Indoor Positioning SystemKriangkrai Maneerat, Krisada Chinda, Charuwalee Suwatthikul, Ladawan Klinkusoom, La-or Kovavisaruch, Kamol Kaemarungsi. 1-4 [doi]
- Software-Defined Vehicular Networks: A Cooperative Approach for Computational OffloadingSyed Danial Ali Shah, Mark A. Gregory, Shuo Li 0003. 1-3 [doi]
- Reference-free Detection of LSB Steganography Using Histogram AnalysisNatiq M. Abdali, Zahir M. Hussain. 1-7 [doi]
- Energy-Efficient Systems for Smart Sensor CommunicationsZahir M. Hussain. 1-4 [doi]
- Emulating Low Probability of Detection AlgorithmsJames Yockey, Benjamin Campbell, Andrew Coyle, Robert Hunjet. 1-6 [doi]
- Energy-Efficient and QoS-aware UAV Communication using Reactive RF Band AllocationMarjan Moradi, Ayub Bokani, Jahan Hassan. 1-6 [doi]
- A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area NetworksJames Jin Kang. 1-3 [doi]
- Quintuple Band Antenna Design Using Stacked Series Array For Millimeter WaveRauful Nibir, Md. Rafiqul Islam, Nazmus S. Nafi, Mark A. Gregory. 1-6 [doi]
- Smart Attendance System in an Enterprise-Based Access Point EnvironmentTemitope Odewole, Rajan Kadel. 1-6 [doi]
- Indigenous Big Data Implications in New ZealandMarianne Cherrington, David Airehrour, Joan Lu, Qiang Xu 0002, Steven Wade, Ihaka Dunn. 1-6 [doi]
- WP4: A P4 Programmable IEEE 802.11 Data PlanePaul Zanna, Pj Radcliffe, Dinesh Kumar. 1-6 [doi]
- Detecting Network Intrusion through Anomalous Packet IdentificationTanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman. 1-6 [doi]
- Constraint-Based Rerouting mechanism to address Congestion in Software Defined NetworksVijaya Durga Chemalamarri, Robin Braun, Mehran Abolhasan. 1-6 [doi]
- Framework for a Decentralized WebRaman Singh, Andrew Donegan, Hitesh Tewari. 1-7 [doi]
- A Spatiotemporal Analysis of a Group-based Access Solution for Massive MTC Networks and the Stability-Scalability Trade-offRasha Al-Khansa, Hassan Ali Artail, Mohamad Assaad, Karim Y. Kabalan. 1-8 [doi]
- Features of Human-Centred Algorithm DesignMarianne Cherrington, David Airehrour, Joan Lu, Qiang Xu 0002, David Cameron-Brown, Ihaka Dunn. 1-6 [doi]
- Design of microstrip antenna and RF circuit for robust wireless communication of IoT devices under partial shield installationBo Hu, Benjamin Fisher, Alirio Guerra, John P. T. Mo. 1-4 [doi]
- MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle NetworksAraya Kibrom Desta, Shuji Ohira, Ismail Arai, Kazutoshi Fujikawa. 1-7 [doi]
- Integrated Game Theoretic-Grey Relational Analysis Handover Method for Heterogeneous NetworksMohanad Alhabo, Naveed Nawaz, Omer Waqar. 1-6 [doi]
- Network Anomaly Detection Using LightGBM: A Gradient Boosting ClassifierMd. Khairul Islam, Prithula Hridi, Md. Shohrab Hossain, Husnu S. Narman. 1-7 [doi]
- On-Demand Blind Packet ForwardingIrfan Simsek. 1-8 [doi]
- Performance Evaluation of UAV-Aided Mobile Networks by Means of Ray Launching Generated REMsSilvia Mignardi, Maximilian James Arpaio, Chiara Buratti, Enrico Maria Vitucci, Franco Fuschini, Roberto Verdone. 1-6 [doi]
- Link Scheduling in Rechargeable Wireless Sensor Networks with Battery Memory EffectsTony 0002, Sieteng Soh, Mihai M. Lazarescu, Kwan-Wu Chin. 1-8 [doi]
- Mitigation of Fake Data Content Poisoning Attacks in NDN via BlockchainStanislaw Baranski, Jerzy Konorski. 1-6 [doi]
- Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware DetectorsMaryam Shahpasand, Leonard Hamey, Mohamed Ali Kâafar, Dinusha Vatsalan. 1-8 [doi]
- Joint Resource Allocation and Computation Offloading Strategy for D2D-assisted and NOMA-based MEC SystemsUmar Ajaib Khan, Rong Chai, Muhammad Junaid Tahir, Waleed Almughalles. 1-7 [doi]
- A distributed algorithm for range-based localization in sparse wireless networksQuentin Vey, Réjane Dalcé, Adrien van den Bossche, Thierry Val. 1-8 [doi]
- An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor FieldHadi Alasti. 1-6 [doi]
- An Investigation on Core Network LatencyUwe Bauknecht, Tobias Enderle. 1-6 [doi]
- Multi-State Border Gateway Protocol for Multi-Domain Software Defined Networking-Based GatewaysHamad Saud Alotaibi, Mark A. Gregory, Shuo Li 0003, Hoang Do. 1-6 [doi]
- An End-to-End Medical Emergency Response System to Support Elderly PeopleMd. Akbar Hossain, Sayan Kumar Ray, Seyed Reza Shahamiri, M. Daud Ahmed, Garry Singh, Rose Arts. 1-6 [doi]
- Cuckoo Prefix: A Hash Set for Compressed IP BlocklistsDonovan Allen, Navid Shaghaghi. 1-8 [doi]
- Dynamic Bandwidth Allocation (DBA) Algorithm for Passive Optical NetworksLiwei Yang, Qi Zhang, Ziyi Huang, Wenjie Zhang. 1-6 [doi]
- Road Crack Detection Using Gaussian Mixture Model for Diverse Illumination ImagesDa-Ren Chen, Wei-Min Chiu. 1-6 [doi]